Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity Open source .Net: Are security risks higher? 04 Dec 2015 SearchSecurity Should enterprises use the Let's Encrypt open certificate authority? 02 Dec 2015 SearchSecurity Can facial recognition authentication improve mobile security? 01 Dec 2015 SearchSecurity Android M security: Is it enterprise-ready? 30 Nov 2015 SearchSecurity How has the NIST random number generation guidance changed? 25 Nov 2015 SearchSecurity Securing APIs is key to counter attacks 20 Nov 2015 SearchSecurity How can address bar spoofing vulnerabilities be prevented? 20 Nov 2015 SearchSecurity How does OpenPGP encryption improve messaging security? 17 Nov 2015 SearchSecurity How to ensure a secure API 16 Nov 2015 SearchSecurity Can Google's Chrome extension policy improve Web security? 16 Nov 2015 SearchSecurity Code security: Can a continuous delivery model be secured? 16 Nov 2015 SearchSecurity How does the Logjam vulnerability affect TLS encryption? 13 Nov 2015 SearchSecurity Secure Hash Algorithm-3: How SHA-3 is a next-gen security tool 30 Oct 2015 SearchSecurity XSS vs. XSSI: What is cross-site script inclusion? 26 Oct 2015 SearchSecurity Does the AFNetworking library inhibit iOS app security? 23 Oct 2015 SearchSecurity Can a subscription ease SSL certificate management? 23 Oct 2015 IoT Agenda What's the key to IoT device discovery in the enterprise? 22 Oct 2015 SearchSecurity Can opportunistic encryption improve browser security? 21 Oct 2015 SearchSecurity Getting to the bottom of the software vulnerability disclosure debate 12 Oct 2015 WhatIs.com wearables security 08 Oct 2015 SearchSecurity How can mobile certificate security risks be reduced? 03 Sep 2015 SearchSecurity Trading Microsoft Patch Tuesday in for Windows Update for Business 03 Sep 2015 SearchSecurity Is Project Shumway a viable enterprise option to replace Flash? 03 Sep 2015 SearchSecurity How can geofencing improve an enterprise security strategy? 01 Sep 2015 SearchSecurity Do third-party DNS providers pose security risks? 01 Sep 2015 SearchSecurity Wearables security: Do enterprises need a separate WYOD policy? 31 Aug 2015 SearchSecurity If mobile remote wipe isn't an option, will selective wipe do? 19 Aug 2015 SearchSecurity Can a walled garden approach help secure Web browsers? 17 Aug 2015 SearchSecurity Can a new encryption trick prevent reverse engineering? 17 Aug 2015 SearchSecurity How is a smart sandbox different from traditional sandbox technology? 13 Aug 2015 SearchSecurity How can I mitigate the risks of alternative Android browsers? 13 Aug 2015 SearchSecurity Microsoft Edge security features raise the bar in Web browser safety 10 Aug 2015 SearchSecurity Developing an IAM strategy for third-party vendors 04 Aug 2015 SearchSecurity Is third-party access the next IAM frontier? 03 Aug 2015 SearchSecurity Third-party risk management: Avoid the dangers of weak controls 23 Jul 2015 SearchSecurity How can an HTTP referer header help maintain user Web privacy? 17 Jul 2015 SearchSecurity Certificate authorities are limited but new TLS versions can help 15 Jul 2015 SearchSecurity Block ciphers: REESSE3+ vs. International Data Encryption Algorithm 15 Jul 2015 SearchSecurity Bloom cookies: Privacy without prohibiting Web personalization? 14 Jul 2015 SearchSecurity Does Peerio offer secure enterprise messaging and file sharing? 13 Jul 2015 SearchSecurity How can we secure enterprise email at home and abroad? 13 Jul 2015 SearchSecurity From SSL and early TLS to TLS 1.2: Creating a PCI DSS 3.1 migration plan 13 Jul 2015 SearchSecurity Browser and device fingerprinting: Undeletable cookies of the future? 10 Jun 2015 SearchSecurity Will Certificate Transparency solve certificate authority trust issues? 08 Jun 2015 SearchSecurity Why are software bundles an enterprise software security issue? 08 Jun 2015 SearchSecurity How can a cross-certificate make Android devices crash? 05 Jun 2015 SearchSecurity After Windows Server 2003 end of life: An emergency action plan 05 Jun 2015 SearchSecurity Is the Boeing Black self-destructing phone enterprise-grade? 05 Jun 2015 SearchSecurity DDoS prevention: The latest means and methods 02 Jun 2015 SearchSecurity Can the Wyvern programming language improve Web app security? 18 May 2015 SearchSecurity Are HTML5 mobile apps an enterprise security concern? 18 May 2015 SearchSecurity Can public key pinning improve Mozilla Firefox security? 15 May 2015 SearchSecurity Is global email an enterprise email security risk? 14 May 2015 SearchSecurity Samsung KNOX security: Does NSA approved equal enterprise approved? 13 May 2015 SearchSecurity Are one-day wonders enterprise Web security risks? 29 Apr 2015 SearchSecurity Are mobile persistent cookies a threat to enterprise data security? 28 Apr 2015 SearchSecurity Will HTTP/2 satisfy the need for speed and enterprise Web security? 28 Apr 2015 SearchSecurity How does public key pinning improve website security? 27 Apr 2015 SearchSecurity Is PGP security still strong or is it time for a new encryption standard? 27 Apr 2015 SearchSecurity Is homomorphic encryption the answer to enterprise encryption issues? 24 Apr 2015 SearchSecurity Creating an end-of-life policy for mobile products in the enterprise 13 Apr 2015 SearchSecurity RASP is latest grasp at secure software delivery 10 Apr 2015 SearchSecurity How will Android encryption by default affect enterprise BYOD? 10 Apr 2015 SearchSecurity How does the Melbourne Shuffle prevent data access pattern recognition? 10 Apr 2015 SearchSecurity Android browser security: How can AOSP browser flaws be fixed? 07 Apr 2015 SearchSecurity What are the Windows Phone 8.1 security improvements? 06 Apr 2015 SearchSecurity How does Pretty Easy Privacy secure online communications? 06 Apr 2015 SearchSecurity How TLS 1.3 updates aim to ensure secure Internet communications 03 Mar 2015 SearchSecurity HTTP/2: Is it the next HTTP? 19 Feb 2015 SearchSecurity What's new with Mac OS X Yosemite security? 19 Feb 2015 SearchSecurity Are security seals a worthwhile website security check? 18 Feb 2015 SearchSecurity Skype vs. Tox: Which is better for secure communications? 17 Feb 2015 SearchSecurity How can jailbroken devices be detected within the enterprise? 13 Feb 2015 SearchSecurity SSL/TLS security: Addressing WinShock, the Schannel vulnerability 06 Feb 2015 SearchSecurity How is Internet authentication changing? 19 Jan 2015 SearchSecurity New authentication technologies can help boost online success 19 Jan 2015 SearchSecurity What the FIDO specification means for multi-factor authentication 19 Jan 2015 SearchSecurity The POODLE vulnerability and its effect on SSL/TLS security 16 Jan 2015 SearchSecurity Detecting backdoors: The Apple backdoor that never was? 07 Jan 2015 SearchSecurity A first look at Windows 10 security features 05 Jan 2015 SearchSecurity How can Microsoft XML vulnerabilities be mitigated? 19 Dec 2014 SearchSecurity Can OAuth 2.0 strengthen authentication? 17 Dec 2014 SearchSecurity How can forged certificates from trusted vendors be stopped? 12 Dec 2014 SearchSecurity Can setting a cache-control header improve application data security? 01 Dec 2014 SearchSecurity Are LibreSSL and BoringSSL safe OpenSSL alternatives? 01 Dec 2014 SearchSecurity Data Encryption Standard (DES) 12 Nov 2014 SearchSecurity SHA-2 algorithm: The how and why of the transition 17 Oct 2014 SearchSecurity Can open source cryptography libraries be trusted? 13 Oct 2014 SearchSecurity Security School: Distributed denial-of-service attack defense 29 Aug 2014 SearchSecurity How can the OWASP Top Ten reduce Web application vulnerabilities? 28 Aug 2014 SearchSecurity The key to assigning risk values in an IT security risk assessment 27 Aug 2014 SearchSecurity Can FIPS 140-2 certification improve enterprise mobile security? 19 Aug 2014 SearchSecurity Third-party application security evaluation tools and services 25 Jul 2014 SearchSecurity The best free vulnerability risk assessment tools 24 Jul 2014 SearchSecurity Mobile keyloggers and touchscreen detection attacks 23 Jul 2014 SearchSecurity Building the business case for a formal patch management program 18 Jul 2014 SearchSecurity Mobile keyloggers: Defense measures against mobile keystroke logging 15 Jul 2014 SearchSecurity Security validation for cloud-based applications 13 Jun 2014 SearchSecurity Are malicious mobile apps a mere inconvenience or a real threat? 11 Jun 2014 SearchSecurity How to use the Metasploit Framework to test for new vulnerabilities 30 Apr 2014 1 2 3 4 5 6 7 8 9